The Community for Technology Leaders
Green Image
Web applications are widely adopted and their correct functioning is mission-critical for many businesses. At the same time, web applications tend to be error-prone and implementation vulnerabilities are readily and commonly exploited by attackers. The design of countermeasures that detect or prevent such vulnerabilities, or protect against their exploitation is an important research challenge for the fields of software engineering and security engineering. In this paper, we focus on one specific type of implementation vulnerability, namely broken dependencies on session data. This vulnerability can lead to a variety of erroneous behaviour at run time and can easily be triggered by a malicious user by applying attack techniques such as forceful browsing. This paper shows how to guarantee the absence of run-time errors due to broken dependencies on session data in web applications. The proposed solution combines development-time program annotation, static verification and run-time checking to provably protect against broken data dependencies. We have developed a prototype implementation of our approach building on the JML annotation language and the existing static verification tool ESC/Java2, and we successfully applied our approach to a representative J2EE based e-commerce application. We show that the annotation overhead is very small, that the performance of the fully automatic static verification is acceptable, and that the performance overhead of the run-time checking is limited.
Software/Program Verification, Security, Security and Protection, Reliability, Data sharing, Web-based services, Web technologies

P. Verbaeten, L. Desmet, F. Piessens and W. Joosen, "Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies," in IEEE Transactions on Software Engineering, vol. 34, no. , pp. 50-64, 2007.
96 ms
(Ver 3.3 (11022016))